咨询与建议

限定检索结果

文献类型

  • 28 篇 期刊文献
  • 5 篇 会议

馆藏范围

  • 33 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 30 篇 工学
    • 13 篇 网络空间安全
    • 11 篇 计算机科学与技术...
    • 5 篇 电子科学与技术(可...
    • 3 篇 机械工程
    • 3 篇 仪器科学与技术
    • 3 篇 信息与通信工程
    • 3 篇 控制科学与工程
    • 2 篇 软件工程
  • 6 篇 军事学
    • 6 篇 军队指挥学
  • 5 篇 管理学
    • 5 篇 管理科学与工程(可...
  • 2 篇 理学
    • 2 篇 数学
    • 1 篇 系统科学
  • 2 篇 艺术学
    • 2 篇 设计学(可授艺术学...
  • 1 篇 经济学
    • 1 篇 应用经济学

主题

  • 33 篇 elliptic curve c...
  • 3 篇 internet of thin...
  • 3 篇 authentication
  • 3 篇 encryption
  • 2 篇 iot
  • 2 篇 wireless sensor ...
  • 2 篇 scalar multiplic...
  • 2 篇 side-channel att...
  • 2 篇 elliptic curves
  • 2 篇 key management
  • 1 篇 health care moni...
  • 1 篇 elliptic curve
  • 1 篇 e-cash
  • 1 篇 diffie hellman
  • 1 篇 secure key excha...
  • 1 篇 twisted edwards ...
  • 1 篇 bluetooth
  • 1 篇 irrigation
  • 1 篇 side channel att...
  • 1 篇 architecture

机构

  • 1 篇 college of compu...
  • 1 篇 r. o.i group inf...
  • 1 篇 department of co...
  • 1 篇 the school of co...
  • 1 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 the department o...
  • 1 篇 department of ae...
  • 1 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 department of cs...
  • 1 篇 school of comput...
  • 1 篇 xidian universit...
  • 1 篇 college of big d...
  • 1 篇 woxsen school of...
  • 1 篇 raptor interacti...
  • 1 篇 school of electr...
  • 1 篇 department of co...
  • 1 篇 college of artif...

作者

  • 1 篇 t.r.sumithira
  • 1 篇 xiao guozhen
  • 1 篇 li qingwen
  • 1 篇 zhang tao
  • 1 篇 zhang ning
  • 1 篇 v.vivekanandhan
  • 1 篇 yi li-hua
  • 1 篇 huaning song
  • 1 篇 raja zahilah
  • 1 篇 md. selim hossai...
  • 1 篇 chinmay chakrabo...
  • 1 篇 ali alharbi
  • 1 篇 farag azzedin
  • 1 篇 shen guicheng1 2...
  • 1 篇 sanam shahla riz...
  • 1 篇 santi martínez
  • 1 篇 yang xiaohui dai...
  • 1 篇 fatima amounas
  • 1 篇 han yu
  • 1 篇 v.nagaraj

语言

  • 31 篇 英文
  • 2 篇 中文
检索条件"主题词=Elliptic curve cryptography"
33 条 记 录,以下是1-10 订阅
排序:
Secure and efficient elliptic curve cryptography resists side-channel attacks
收藏 引用
Journal of Systems Engineering and Electronics 2009年 第3期20卷 660-665页
作者: Zhang Tao Fan Mingyu Zheng Xiaoyu Westone Information Industry Inc Chengdu 610041 P. R. China School of Computer Science & Engineering Univ. of Electronic Science and Technology of China Chengdu 610054 P. R. China School of Electronic Engineering Univ. of Electronic Science and Technology of China Chengdu 610054 P. R. China
An embedded cryptosystem needs higher reconfiguration capability and security. After analyzing the newly emerging side-channel attacks on elliptic curve cryptosystem (ECC), an efficient fractional width-w NAF (FWNA... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
RGB Based Multiple Share Creation in Visual cryptography with Aid of elliptic curve cryptography
收藏 引用
China Communications 2017年 第2期14卷 118-130页
作者: K.Shankar P.Eswaran Department of Computer Science and Engineering Alagappa UniversityKaraikudi-630003Tamil NaduIndia Department of Computer Science and Engineering Alagappa UniversityKaraikudi-630003Tamil NaduIndia
In visual cryptography, many shares are generated which are illogical containing certain message within themselves. When all shares are piled jointly, they tend to expose the secret of the image. The notion of visual ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Smart Grid Communication Under elliptic curve cryptography
收藏 引用
Intelligent Automation & Soft Computing 2023年 第5期36卷 2333-2347页
作者: B.Prabakaran T.R.Sumithira V.Nagaraj Mahendra Engineering College Salem637503TamilnaduIndia Government College of Engineering Salem636011TamilnaduIndia Knowledge Institute of Technology Salem637504TamilnaduIndia
Smart Grids(SGs)are introduced as a solution for standard power *** significant capabilities of smart grids help to monitor consumer behaviors and power ***,the delay-sensitive network faces numer-ous challenges in whi... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
ASIP for elliptic curve cryptography Based on VLIW Architecture
收藏 引用
China Communications 2010年 第4期7卷 161-166页
作者: YANG Xiaohui DAI Zibin ZHANG Jun ZHANG Yongfu Institute of Electronic Technology the Information Engineering University Zhengzhou 450004 China
The requirement of the flexible and effective implementation of the elliptic curve cryptography (ECC) has become more and more exigent since its dominant position in the public-key cryptography *** on analyzing the ba... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
The Study and Application of elliptic curve cryptography Library on Wireless Sensor Network
The Study and Application of Elliptic Curve Cryptography Lib...
收藏 引用
2008 11th IEEE International Conference on Communication Technology(ICCT2008)
作者: WANG Wei-hong LIN Yu-bing CHEN Tie-ming College of software Zhejiang University of Technology Hangzhou 310032 China
Information security on WSN is an open and hot ***,this paper briefly introduces the structure of WSN operating system TinyOs,the flow of Nesc program and the elliptic curve cryptography library *** the basis of TinyO... 详细信息
来源: cnki会议 评论
cryptography with elliptic curve Using Tifinagh Characters
收藏 引用
Journal of Mathematics and System Science 2012年 第2期2卷 139-144页
作者: Fatima Amounas El Hassan El Kinani R. O.I Group Informatics Department Faculty of Sciences and Technics Moulay Ismail University Box 509 Errachidia 52000 Morocco A.A Group Mathematical Department Faculty of Sciences and Technics Moulay Ismail University Box 509 Errachidia 52000 Morocco
The paper describes the concept of plaintext encryption by using the Unicode characters. In the case of elliptic curve cryptography, there is not specified rule or algorithm to specify the letters of Tifinagh as well ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
An efficient and authenticated key establishment scheme based on fog computing for healthcare system
收藏 引用
Frontiers of Computer Science 2022年 第4期16卷 173-184页
作者: Xinghua Li Ting Chen Qingfeng Cheng Jianfeng Ma School of Cyber Engineering Xidian UniversityXi’an710071China
Because of its closeness to users,fog computing responds faster than cloud ***,it has been deployed to various applications,such as healthcare ***,to ensure the secure communication of the fog-based healthcare system,... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A Secure elliptic curve-Based RFID Protocol
收藏 引用
Journal of Computer Science & Technology 2009年 第2期24卷 309-318页
作者: Santi Martínez Magda Valls Concepció Roig Josep M. Miret Francesc Giné Computer Science Department Universitat de Lleida Mathematics Department Universitat de Lleida
Nowadays, the use of Radio Frequency Identification (RFID) systems in industry and stores has increased Nevertheless, some of these systems present privacy problems that may discourage potential users. Hence, high c... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
cryptography on twisted Edwards curves over local fields
收藏 引用
Science China(Information Sciences) 2015年 第1期58卷 150-164页
作者: TANG ChunMing XU MaoZhi QI YanFeng School of Mathematics and Information China West Normal University Laboratory of Mathematics and Applied Mathematics School of Mathematical SciencesPeking University School of Science Hangzhou Dianzi University
Twisted Edwards curves over finite fields have attracted great interest for their efficient and unified addition formula. In this paper, we consider twisted Edwards curves over local fields and introduce a cryptosyste... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
EBAKE-SE: A novel ECC-based authenticated key exchange between industrial IoT devices using secure element
收藏 引用
Digital Communications and Networks 2023年 第2期9卷 358-366页
作者: Chintan Patel Ali Kashif Bashir Ahmad Ali AlZubi Rutvij Jhaveri School of Artificial Intelligence Information Technology and Cyber SecurityRashtriya Raksha UniversityGujaratIndia Department of Computing and Mathematics Manchester Metropolitan UniversityUnited Kingdom Woxsen School of Business Woxsen UniversityIndia Department of Computer Science and Mathematics Lebanese American UniversityBeirutLebanon Computer Science Department Community CollegeKing Saud UniversityP.O.Box 28095Riyadh11437Saudi Arabia Department of Computer Science and Engineering School of TechnologyPandit Deendayal Energy UniversityGujaratIndia
Industrial IoT(IIoT)aims to enhance services provided by various industries,such as manufacturing and product *** suffers from various challenges,and security is one of the key challenge among those *** and access con... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论